We performed a comparison between Qualys VMDR and XM Cyber based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management."The initial setup is straightforward."
"Technical support is great and we've never really had a problem."
"It's a good product. After the scan our internet works well. It scans our security posture."
"It's stable and quite reliable."
"The most valuable feature is the ability to run different capabilities with the same agent. With only one agent, we can have EDR, vulnerability management, compliance and some basic SaaS security capabilities."
"Performs automated, regular scans in the network."
"It is quite easy to implement."
"I find Qualys VM very robust, and it's very useful for vulnerability management and patch management. The value that it brings to my environment is economies of scale. There is no limitation on adding any endpoints. You go by the rule, and it's added once another endpoint is added to our environment. It's automatically installed, and it's less work from our end. It frees up my license automatically if I don't need an endpoint or if my machine is decommissioned. I like the dashboard displays because I don't see any duplication. The most important part is vulnerability management and prioritization. Unlike Symantec, it shows the kind of vulnerability I would want to patch first. It provides a holistic view of the kind of vulnerabilities and the ones I should remediate first. I don't have to do a scan; it just brings up those critical kinds of vulnerabilities like zero-day vulnerabilities and tells me to prioritize them. You have to prioritize these vulnerabilities first and go on with the rest. The dashboard shows me the ones that have been fixed, so I don't have to complete an aging report. The user experience and the graphical interface are good. As it's user-friendly and understandable on an executive level, it brings real value. We also use this solution because it's robust and flexibile."
"The platform's most valuable feature is attack simulation."
"What I personally like very much, from my experience, is that it is very reliable."
"Qualys should improve their customer experience. They need to improve the tech support experience and the turnaround time."
"Qualys Container Security can improve the interface. It could be easier to navigate and be enriched."
"The price could be better. Asset view is still a legacy feature. I'm not able to extract the information about the asset with complete details. It would be better if they fixed that in the next release. I know Qualys is already working on it, so I'm hopeful it will be available in the next five or six months. That would be something that's changed where I seek improvement."
"They should make it accessible for more operating systems."
"Certain integration factors between different options could be improved."
"I would like to see this solution more developed and competitive in the Cloud space."
"The reporting and dashboards could improve in Qualys VM. However, they have improved since the previous versions."
"If anything, I would like to see the user interface modernized a bit more."
"We'd like to see a cheaper price."
"XM Cyber could identify all areas of vulnerability. They could expand the identification span for different areas."
Qualys VMDR is ranked 3rd in Risk-Based Vulnerability Management with 77 reviews while XM Cyber is ranked 26th in Cloud Security Posture Management (CSPM) with 2 reviews. Qualys VMDR is rated 8.2, while XM Cyber is rated 8.0. The top reviewer of Qualys VMDR writes "Good visibility but expensive and needs better support". On the other hand, the top reviewer of XM Cyber writes "Reliable with no false-positives and helpful support". Qualys VMDR is most compared with Tenable Nessus, Tenable Security Center, Rapid7 InsightVM, Microsoft Defender Vulnerability Management and Tenable Vulnerability Management, whereas XM Cyber is most compared with Pentera, Cymulate, SafeBreach, Tenable Security Center and Orca Security.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.